Which of the following is true for network structure?

A. It is a physical representation of the data.

B. It allows many to many relationship.

C. It is conceptually simple.

D. It will be the dominant database of the future.

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. ………………… approach reduces time and effort required for design…
  2. A relational database developer refers to a record as
  3. A data type or format is specified for each _________
  4. The one guideline to be followed while designing the database is
  5. Which two files are used during operation of the DBMS?
  6. ______is a special type of integrity constraint that relates two relations & maintains consistency across…
  7. _____ First proposed the process of normalization.
  8. Which is the best file organization when data is frequently added or deleted from a file?
  9. In SQL the statement select * from R, S is equivalent to
  10. DFD stands for
  11. When an E-R diagram is mapped to tables, the representation is redundant for
  12. Data independence means
  13. Grant and revoke are _____ statements.
  14. The cost of reading and writing temporary files while evaluating a query can be reduced by
  15. Between DRAM and magnetic disk storage another form of memory, called ______ memory is becoming common…
  16. A ____ key specifies a uniqueness constraint that no two distinct tuples in any state r of relation…
  17. An outstanding functionality of SQL is its support for automatic_____ to the target data.
  18. If two relations R and S are joined, then the non matching tuples of both R and S are ignored in
  19. Manager salary details are hidden from the employee .This is
  20. ______contains information that defines valid values that are stored in a column or data type.
  21. What are the desirable properties of a decomposition
  22. Key to represent relationship between tables is called
  23. DBMS is a collection of _____ that enables user to create and maintain a database.
  24. The ______ language consists of SQL statements for operating on the data (insert, Modify, Delete) in…
  25. A DBMS is a ____ user if at most one user can use the system and is mostly restricted to personal computer…
  26. operator is used to compare a value to a list of literals values that have been specified.
  27. ______is a preferred method for enforcing data integrity
  28. _____ is a utility to capture a continuous record of server activity and provide auditing capability.
  29. Isolation of the transactions is ensured by
  30. A relation is in attribute of other composite key. if an attribute of a composite key is dependent on…